<--Back Next-->

Applications of Field Manipulation Interception


Here are some ideas I've heard people mention:
  • Lazily bring in fields from a database or a remote source at first access
  • Dependency Injection
  • Tracking field access for logging or security reasons
  • ...

<--Back Next-->